/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth2-gss.c | 63 gss_buffer_desc mic, gssbuf; local 66 mic.value = packet_get_string(&len); 67 mic.length = len; 79 &gssbuf, &mic)))) 84 xfree(mic.value); 200 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL); 289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 299 gss_buffer_desc mic, gssbuf; local 307 mic.value = packet_get_string(&len); 308 mic [all...] |
H A D | sshconnect2.c | 389 {"gssapi-with-mic", 762 gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; local 788 authctxt->service, "gssapi-with-mic"); 793 status = ssh_gssapi_sign(gssctxt, &gssbuf, &mic); 797 packet_put_string(mic.value, mic.length); 803 gss_release_buffer(&ms, &mic); 933 gss_buffer_desc mic = GSS_C_EMPTY_BUFFER; local 951 if (GSS_ERROR(ssh_gssapi_sign(gss_kex_context, &gssbuf, &mic))) { 960 packet_put_string(mic [all...] |
H A D | monitor.c | 2131 gss_buffer_desc gssbuf, mic; local 2140 mic.value = buffer_get_string(m, &len); 2141 mic.length = len; 2143 ret = ssh_gssapi_checkmic(gsscontext, &gssbuf, &mic); 2146 xfree(mic.value); 2176 auth_method = "gssapi-with-mic";
|
/macosx-10.10/ruby-106/ruby/ext/tk/lib/tk/ |
H A D | clock.rb | 20 when /^mic/
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ntlm/ |
H A D | accept_sec_context.c | 430 _gss_mg_log(1, "ntlm-asc-type3 mic missing from reply"); 440 memset(p, 0, sizeof(type3.mic)); 448 if (memcmp(p, type3.mic, sizeof(type3.mic)) != 0) { 449 _gss_ntlm_debug_hex(10, "mic", type3.mic, sizeof(type3.mic)); 450 _gss_ntlm_debug_hex(10, "ntlm-asc-type3 mic invalid", p, sizeof(type3.mic));
|
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | heimntlm.h | 158 uint8_t mic[16]; member in struct:ntlm_type3
|
H A D | ntlm.c | 1034 CHECK_SIZE(krb5_storage_read(in, type3->mic, sizeof(type3->mic)), sizeof(type3->mic));
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/spnego/ |
H A D | compat.c | 195 * Don't require mic for NTLM because 196 * - Windows servers to have negTokenResp.negResult set for the acceptor to send the mic. 359 heim_octet_string *mic) 370 mic_buf.length = mic->length; 371 mic_buf.value = mic->data; 357 _gss_spnego_verify_mechtypes_mic(OM_uint32 *minor_status, gssspnego_ctx ctx, heim_octet_string *mic) argument
|
H A D | spnego-private.h | 275 heim_octet_string *mic);
|
H A D | accept_sec_context.c | 390 heim_octet_string *mic, 402 if (mic != NULL) 417 if (verify_mic && mic == NULL && ctx->flags.safe_omit) { 419 * Peer is old and didn't send a mic while we expected 423 ret = _gss_spnego_verify_mechtypes_mic(minor_status, ctx, mic); 385 acceptor_complete(OM_uint32 * minor_status, gssspnego_ctx ctx, int *get_mic, gss_buffer_t mech_input_token, gss_buffer_t mech_output_token, heim_octet_string *mic, gss_buffer_t output_token) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/heimcred/ |
H A D | ntlm.m | 209 * authenticate if the mic is missing. 296 CCHmacContext mic; 298 CCHmacInit(&mic, kCCHmacAlgMD5, sessionkey.data, sessionkey.length); 299 CCHmacUpdate(&mic, type1data.data, type1data.length); 300 CCHmacUpdate(&mic, type2data.data, type2data.length); 301 CCHmacUpdate(&mic, ndata.data, ndata.length); 302 CCHmacFinal(&mic, p);
|
/macosx-10.10/Heimdal-398.1.2/appl/gssmask/ |
H A D | gssmaestro.c | 217 krb5_data *in, krb5_data *mic) 226 retdata(client, *mic); 232 krb5_data *in, krb5_data *mic) 240 putdata(client, *mic); 412 krb5_data msg, mic; local 418 krb5_data_zero(&mic); 420 val = get_mic(c1, hc1, &msg, &mic); 423 val = verify_mic(c2, hc2, &msg, &mic); 427 krb5_data_free(&mic); 522 /* mic */ 216 get_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument 231 verify_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument [all...] |
H A D | gssmask.c | 607 krb5_data msg, mic; local 625 retdata(c, mic); 627 mic_token.length = mic.length; 628 mic_token.value = mic.data; 635 krb5_data_free(&mic);
|
/macosx-10.10/MITKerberosShim-66/test/ |
H A D | test-gss-common.c | 293 gss_buffer_desc mic; local 296 majorStatus = gss_get_mic(&minorStatus, inContext, GSS_C_QOP_DEFAULT, &outputBuffer, &mic); 298 //err = WriteToken (inSocket, mic.value, mic.length);
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | security.c | 311 static const char *mic = "MIC "; local 315 socket_write(conn, fd, mic, 4); 319 infof(conn->data, "Send: %s%s\n", prot_level == PROT_PRIVATE?enc:mic,
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ns/ |
H A D | GSSKit.h | 150 - (BOOL)verifyMessageIntegrityCodeFromData: (NSData *)data withCode: (NSData *)mic returnFlags: (OM_uint32 *)flags error: (NSError *)error;
|
/macosx-10.10/Heimdal-398.1.2/kcm/ |
H A D | protocol.c | 2087 * authenticate if the mic is missing. 2174 CCHmacContext mic; local 2176 CCHmacInit(&mic, kCCHmacAlgMD5, sessionkey.data, sessionkey.length); 2177 CCHmacUpdate(&mic, type1data.data, type1data.length); 2178 CCHmacUpdate(&mic, type2data.data, type2data.length); 2179 CCHmacUpdate(&mic, ndata.data, ndata.length); 2180 CCHmacFinal(&mic, p);
|